Tuleap before 9.7 allows command injection via the PhpWiki 1.3.10 SyntaxHighlighter plugin. This occurs in the Project Wiki component because the proc_open PHP function is used within PhpWiki before 1.5.5 with a syntax value in its first argument, and an authenticated Tuleap user can control this value, even with shell metacharacters, as demonstrated by a '<?plugin SyntaxHighlighter syntax="c;id"' line to execute the id command.
References
Link | Resource |
---|---|
https://github.com/xdrr/vulnerability-research/blob/master/webapp/tuleap/2017.04.tuleap-auth-ci.md | Exploit Third Party Advisory |
https://tuleap.net/file/shownotes.php?release_id=137#/linked-artifacts | Release Notes Vendor Advisory |
https://tuleap.net/plugins/tracker/?aid=10159 | Patch Vendor Advisory |
https://www.exploit-db.com/exploits/41953/ | Third Party Advisory VDB Entry |
https://github.com/xdrr/vulnerability-research/blob/master/webapp/tuleap/2017.04.tuleap-auth-ci.md | Exploit Third Party Advisory |
https://tuleap.net/file/shownotes.php?release_id=137#/linked-artifacts | Release Notes Vendor Advisory |
https://tuleap.net/plugins/tracker/?aid=10159 | Patch Vendor Advisory |
https://www.exploit-db.com/exploits/41953/ | Third Party Advisory VDB Entry |
Configurations
History
21 Nov 2024, 03:33
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/xdrr/vulnerability-research/blob/master/webapp/tuleap/2017.04.tuleap-auth-ci.md - Exploit, Third Party Advisory | |
References | () https://tuleap.net/file/shownotes.php?release_id=137#/linked-artifacts - Release Notes, Vendor Advisory | |
References | () https://tuleap.net/plugins/tracker/?aid=10159 - Patch, Vendor Advisory | |
References | () https://www.exploit-db.com/exploits/41953/ - Third Party Advisory, VDB Entry |
Information
Published : 2017-04-29 16:59
Updated : 2024-11-21 03:33
NVD link : CVE-2017-7981
Mitre link : CVE-2017-7981
CVE.ORG link : CVE-2017-7981
JSON object : View
Products Affected
enalean
- tuleap
phpwiki_project
- phpwiki
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')